期刊文献+

基于使用控制的资源分发模型 被引量:1

The resource dissemination model based on vsage control
下载PDF
导出
摘要 基于信息资源分发特性的研究,分析了资料分发在使用控制(UCON)体系框架中的具体表现,提出了一种基于使用控制的资源分发模型,同时给出了客户端—服务器端引用监视器相结合的体系架构的关键核心函数及应用实例.该模型基于使用控制解决了资源分发问题,丰富了UCON基本框架. The authors analyzed the behavior of resource dissemination in UCON, proposed a new model based on UCON the resource dissemination model, which is a extended UCON model, and described key functions of its framework with Client-Server Reference Monitors. This model is richer and finer than the UCON basic model in resource dissemination.
作者 王斐 王凤英
出处 《山东理工大学学报(自然科学版)》 CAS 2007年第4期31-34,共4页 Journal of Shandong University of Technology:Natural Science Edition
关键词 使用控制 资源分发策略 分发树 证书和票据 Usage control dissemination policies dissemination trees license and ticket
  • 相关文献

参考文献5

  • 1Jaehong Park, Ravi Sandhu. The UCONABC usage control model[J]. ACM Transactions on Information and System Security, 2004, 7(1): 128-174.
  • 2袁磊.使用控制模型的研究[J].计算机工程,2005,31(12):146-148. 被引量:12
  • 3Jaehong Park, Ravi Sandhu. Originator control in usage control[A]. Proceedings of the third international workshop on policies for distributed systems and networks[C] (POLICY 02) IEEE Computer Society Press, 2002: 60-66.
  • 4Li Z, Ye X J. Towards a dynamic multi-policy dissemination control model (DMDCON) [J]. ACM SIGMOD Reeord. 2006, 35(1):33-38.
  • 5唐文,胡建斌,陈钟.基于模糊逻辑的主观信任管理模型研究[J].计算机研究与发展,2005,42(10):1654-1659. 被引量:84

二级参考文献15

  • 1M. Burrows, M. Abadi, R. M. Needham. A logic of authentication. The Royal Society of London, DEC Systems Research Center, Tech. Rep.: 39, 1989.
  • 2R. Yahalom, B. Klein, Th. Beth. Trust relationships in secure systems-A distributed authentication perspective. In: Proc.1993 IEEE Symposium On Research in Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1993. 150~164.
  • 3A. Jφsang. Prospectives for modeling trust in information security. Information Security and Privacy, Second Australasian Conf., ACISP'97, Syndey, NSW, Australia, 1997.
  • 4T. Beth, M. Borcherding, B. Klein. Valuation of trust in open networks. In: Proc. European Symposium on Research in Security (ESORICS). Berlin: Springer-Verlag, 1994. 3~18.
  • 5A.J. Sang. A logic for uncertain probabilities. Int'l Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2001, 9(3): 279~311.
  • 6E. Gerck. Toward real-world models of trust: Reliance on received information. http: ∥ www. mcg.org. br/trustdef. htm,1998.
  • 7D. Gambetta. Can we trust trust? In: Trust: Making and Breaking Cooperative Relations (Electronic edition), Department of Sociology, University of Oxford, Chapter 13. http: ∥www. sociology. ox. ac. uk/papers/gambetta 213 ~ 237. pdf, 2000.213~237.
  • 8LA扎德.模糊集合、语言变量及模糊逻辑[M].北京:科学出版社,1982.63-84.
  • 9C. C. Lee. Fuzzy logic in control systems: Fuzzy logic controller-Part Ⅱ. IEEE Trans. System, Man, and Cybernetics, 1990, 20(2): 419~435.
  • 10Security Frameworks for Open Systems: Access Control Framework.Technical Report ISO/IEC 10181-3, ISO, 1996.

共引文献93

同被引文献10

  • 1阎希光.可信计算的研究及其发展[J].信息安全与通信保密,2006,28(11):18-20. 被引量:6
  • 2Jaehong Park,Ravi Sandhu.The UCONABC usage control model. ACM Transactions on Information and System Security . 2004
  • 3Xinwen Zhang,Jean-Pierre Seifert.Security Enforcement Model for Distributed Usage Control. Proceedings 2nd IEEE International Conference on Sensor Networks,Ubiquitous,and Trustworthy Computing (SUTC) . 2008
  • 4Jaehong Park,Xinwen Zhang,Ravi Snadhu.Arrtibute mutability in usage control. Proceedings of 18th Annual IFIP WG 11.3 Working Conference on Data and Applications Security . 2004
  • 5Ravi Sandhu,Jaehong Park.Usage control:A vision for next generation access control. Proceedings of The 2nd International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security . 2003
  • 6Park J,Sandhu R.Towards usage control models: Beyond traditional access control. Proceedings of the 7th ACM Symposium on Access Control Models and technologies (SACMATr02) . 2002
  • 7魏景芝,杨义先,钮心忻.OMA DRM技术体系研究综述[J].电子与信息学报,2008,30(3):746-751. 被引量:12
  • 8陈晓宏.传统出版向数字出版转型的思考[J].中共福建省委党校学报,2009(1):87-91. 被引量:21
  • 9初晓博,秦宇.一种基于可信计算的分布式使用控制系统[J].计算机学报,2010,33(1):93-102. 被引量:21
  • 10李润峰,马兆丰,杨义先,钮心忻.数字版权管理安全性评测模型研究[J].计算机科学,2011,38(3):24-27. 被引量:3

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部